The increasing of hash functions security
Fundamentalʹnaâ i prikladnaâ matematika, Tome 15 (2009) no. 5, pp. 171-179.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this paper, we introduce a solution of a data integrity ensuring using cryptographic one-way hash functions. The cryptographical security of such hash functions was estimated by us in detail for different kinds of attacks. We propose a several new schemes of a one-way hash functions security strengthening without reformation of its internal algorithms. Also we outline schemes with the best speed and security level. We show that the Schneier method of suffix superposition has seriously drawback. In this article, we also suggest the method of constructing collision resistant one-way hash functions from standard well-known hash functions. Therefore, the proposed schemas can be used for upgrade majority cryptographic one-way functions, such as MD4, MD5, RIPEMD, SHA, GOST 34 11-94.
@article{FPM_2009_15_5_a7,
     author = {V. Yu. Levin},
     title = {The increasing of hash functions security},
     journal = {Fundamentalʹna\^a i prikladna\^a matematika},
     pages = {171--179},
     publisher = {mathdoc},
     volume = {15},
     number = {5},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/FPM_2009_15_5_a7/}
}
TY  - JOUR
AU  - V. Yu. Levin
TI  - The increasing of hash functions security
JO  - Fundamentalʹnaâ i prikladnaâ matematika
PY  - 2009
SP  - 171
EP  - 179
VL  - 15
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/FPM_2009_15_5_a7/
LA  - ru
ID  - FPM_2009_15_5_a7
ER  - 
%0 Journal Article
%A V. Yu. Levin
%T The increasing of hash functions security
%J Fundamentalʹnaâ i prikladnaâ matematika
%D 2009
%P 171-179
%V 15
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/FPM_2009_15_5_a7/
%G ru
%F FPM_2009_15_5_a7
V. Yu. Levin. The increasing of hash functions security. Fundamentalʹnaâ i prikladnaâ matematika, Tome 15 (2009) no. 5, pp. 171-179. http://geodesic.mathdoc.fr/item/FPM_2009_15_5_a7/

[2] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002

[3] Menezes A., Oorschot O., Vanstone S., Handbook of Applied Cryptography, CRC Press, 1996

[4] Wang X., Feng D., Lai X., Yu H., “Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD”, CRYPTO, 2004